Nuno Santos

Orcid: 0000-0001-9938-0653

Affiliations:
  • University of Lisbon, IST, Portugal (since 2013)
  • INESC-ID - Distributed Systems Group, Lisbon, Portugal (since 2013)
  • Max Planck Institute for Software Systems, Saarbrücken, Germany (PhD 2013)


According to our database1, Nuno Santos authored at least 51 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Study of JavaScript Static Analysis Tools for Vulnerability Detection in Node.js Packages.
IEEE Trans. Reliab., December, 2023

Enhancing the Unlinkability of Circuit-Based Anonymous Communications with k-Funnels.
PACMNET, 2023

TIGER: Tor Traffic Generator for Realistic Experiments.
Proceedings of the 22nd Workshop on Privacy in the Electronic Society, 2023

RuleKeeper: GDPR-Aware Personal Data Compliance for Web Frameworks.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Trusted Heterogeneous Disaggregated Architectures.
Proceedings of the 14th ACM SIGOPS Asia-Pacific Workshop on Systems, 2023

2022
Concolic Execution for WebAssembly (Artifact).
Dagstuhl Artifacts Ser., 2022

Wasmati: An efficient static vulnerability scanner for WebAssembly.
Comput. Secur., 2022

ReZone: Disarming TrustZone with TEE Privilege Reduction.
Proceedings of the 31st USENIX Security Symposium, 2022

Secure and Policy-Compliant Query Processing on Heterogeneous Computational Storage Architectures.
Proceedings of the SIGMOD '22: International Conference on Management of Data, Philadelphia, PA, USA, June 12, 2022

Concolic Execution for WebAssembly.
Proceedings of the 36th European Conference on Object-Oriented Programming, 2022

Poster: User Sessions on Tor Onion Services: Can Colluding ISPs Deanonymize Them at Scale?
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Poster: A Systems Approach to GDPR Compliance-by-Design in Web Development Stacks.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Stegozoa: Enhancing WebRTC Covert Channels with Video Steganography for Internet Censorship Circumvention.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
FlowLens: Enabling Efficient Flow Classification for ML-based Network Security Applications.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

2020
Flowverine: Leveraging Dataflow Programming for Building Privacy-Sensitive Android Applications.
Proceedings of the 19th IEEE International Conference on Trust, 2020

SoK: Understanding the Prevailing Security Vulnerabilities in TrustZone-assisted TEE Systems.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Censorship-resistant web annotations based on ethereum and IPFS.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

My House, My Rules: A Private-by-Design Smart Home Platform.
Proceedings of the MobiQuitous '20: Computing, 2020

Towards a Scalable Censorship-Resistant Overlay Network based on WebRTC Covert Channels.
Proceedings of the DICG@Middleware 2020, 2020

Poking a Hole in the Wall: Efficient Censorship-Resistant Internet Communications by Parasitizing on WebRTC.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Demystifying Arm TrustZone: A Comprehensive Survey.
ACM Comput. Surv., 2019

Forensic analysis of communication records of messaging applications from physical memory.
Comput. Secur., 2019

2018
Effective Detection of Multimedia Protocol Tunneling using Machine Learning.
Proceedings of the 27th USENIX Security Symposium, 2018

Leveraging ARM TrustZone and Verifiable Computing to Provide Auditable Mobile Functions.
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018

An Extended Case Study about Securing Smart Home Hubs through N-version Programming.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

DBStore: A TrustZone-backed Database Management System for Mobile Applications.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

HomePad: A Privacy-Aware Smart Hub for Home Environments.
Proceedings of the 2018 IEEE/ACM Symposium on Edge Computing, 2018

2017
DeltaShaper: Enabling Unobservable Censorship-resistant TCP Tunneling over Videoconferencing Streams.
Proc. Priv. Enhancing Technol., 2017

Cross-domain identity and discovery framework for web calling services.
Ann. des Télécommunications, 2017

Forensic Analysis of Communication Records of Web-based Messaging Applications from Physical Memory.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

TrUbi: A System for Dynamically Constraining Mobile Devices within Restrictive Usage Scenarios.
Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2017

Decentralized Communications: Trustworthy interoperability in peer-to-peer networks.
Proceedings of the 2017 European Conference on Networks and Communications, 2017

2016
Storekeeper: A Security-Enhanced Cloud Storage Aggregation Service.
Proceedings of the 35th IEEE Symposium on Reliable Distributed Systems, 2016

ShareIff: A Sticky Policy Middleware for Self-Destructing Messages in Android Applications.
Proceedings of the 35th IEEE Symposium on Reliable Distributed Systems, 2016

ARM TrustZone for Secure Image Processing on the Cloud.
Proceedings of the 35th IEEE Symposium on Reliable Distributed Systems Workshops, 2016

P-Cop: A Cloud Administration Proxy to Enforce Bipartite Maintenance of PaaS Services.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2015
Termite: Emulation Testbed for Encounter Networks.
EAI Endorsed Trans. Ambient Syst., 2015

A Case for Enforcing App-Specific Constraints to Mobile Devices by Using Trust Leases.
Proceedings of the 15th Workshop on Hot Topics in Operating Systems, 2015

2014
Leveraging Trusted Computing and Model Checking to Build Dependable Virtual Machines.
Proceedings of the 10th Workshop on Hot Topics in System Dependability, 2014

Using ARM trustzone to build a trusted language runtime for mobile applications.
Proceedings of the Architectural Support for Programming Languages and Operating Systems, 2014

2013
Verifying cloud services: present and future.
ACM SIGOPS Oper. Syst. Rev., 2013

2012
Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Enhancing the OS against Security Threats in System Administration.
Proceedings of the Middleware 2012, 2012

2011
Trusted language runtime (TLR): enabling trusted applications on smartphones.
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, 2011

2010
Unifying divergence bounding and locality awareness in replicated systems with vector-field consistency.
J. Internet Serv. Appl., 2010

NetEx: efficient and cost-effective internet bulk content delivery.
Proceedings of the 2010 ACM/IEEE Symposium on Architecture for Networking and Communications Systems, 2010

2009
Towards Trusted Cloud Computing.
Proceedings of the Workshop on Hot Topics in Cloud Computing, 2009

2007
Vector-Field Consistency for Ad-Hoc Gaming.
Proceedings of the Middleware 2007, 2007

2006
Making Distributed Transactions Resilient to Intermittent Network Connections.
Proceedings of the 2006 International Symposium on a World of Wireless, 2006

2004
Transaction Policies for Mobile Networks.
Proceedings of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 2004

Loosely-Coupled, Mobile Replication of Objects with Transactions.
Proceedings of the 10th International Conference on Parallel and Distributed Systems, 2004


  Loading...